US20070018787A1 - Systems and methods for secure locking mechanisms - Google Patents

Systems and methods for secure locking mechanisms Download PDF

Info

Publication number
US20070018787A1
US20070018787A1 US11/459,598 US45959806A US2007018787A1 US 20070018787 A1 US20070018787 A1 US 20070018787A1 US 45959806 A US45959806 A US 45959806A US 2007018787 A1 US2007018787 A1 US 2007018787A1
Authority
US
United States
Prior art keywords
lock
rfid
key
reader
communication protocol
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US11/459,598
Inventor
Francisco Martinez de Velasco Cortina
Enrique Martinez de Velasco
Eric Mikuteit
Jun Lui
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Neology Inc
Original Assignee
Neology Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Neology Inc filed Critical Neology Inc
Priority to US11/459,598 priority Critical patent/US20070018787A1/en
Assigned to NEOLOGY, INC. reassignment NEOLOGY, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: NEOLOGY, INC.
Assigned to NEOLOGY, INC. reassignment NEOLOGY, INC. CORRECTIVE ASSIGNMENT TO CORRECT THE ASSIGNOR OF THE ASSIGNMENT PREVIOUSLY RECORDED ON REEL 018531 FRAME 0629. ASSIGNOR(S) HEREBY CONFIRMS THE CORRECTIVE ASSIGNMENT TO CORRECT THE ASSIGNOR.. Assignors: MARTINEZ DE VELASCO, ENRIQUE, MIKUTEIT, ERIC, LUI, JUN, MARTINEZ DE VELASCO CORTINA, FRANCISCO
Publication of US20070018787A1 publication Critical patent/US20070018787A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00182Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with unidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/27Individual registration on entry or exit involving the use of a pass with central registration
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/28Individual registration on entry or exit involving the use of a pass the pass enabling tracking or indicating presence
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R2325/00Indexing scheme relating to vehicle anti-theft devices
    • B60R2325/10Communication protocols, communication systems of vehicle anti-theft devices
    • B60R2325/105Radio frequency identification data [RFID]
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C2009/00753Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys
    • G07C2009/00769Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys with data transmission performed by wireless means
    • G07C2009/00793Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys with data transmission performed by wireless means by Hertzian waves
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00896Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses
    • G07C2009/0092Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses for cargo, freight or shipping containers and applications therefore in general
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C11/00Arrangements, systems or apparatus for checking, e.g. the occurrence of a condition, not provided for elsewhere
    • G07C2011/02Arrangements, systems or apparatus for checking, e.g. the occurrence of a condition, not provided for elsewhere related to amusement parks

Definitions

  • the present invention relates generally to Radio Frequency Identification Technology (RFID), and more particularly to secure locking mechanisms that use RFID to control access.
  • RFID Radio Frequency Identification Technology
  • RFID systems can include several components including, RFID tags, RFID tag readers, RFID tag programmers, etc.
  • the RFID system can allow data to be transmitted by the RFID tag to an RFID reader when the RFID reader interrogates the RFID tag.
  • the information transmitted from the tag to the reader can be used or processed in many different ways depending on the particular application.
  • an RFID tag can provide identification information, or information about a product to which the tag is affixed, such as the price of the product.
  • an RFID tag can contain a transponder that can include a digital memory chip that can be given a unique electronic code.
  • the RFID reader can transmit a signal activating the RFID tag and allowing it to be read and written with data. For example, when an RFID tag passes through an RFID reader, the RFID tag can detect a signal from the reader and can transmit data from the tag to the reader in response. The reader can then decode the data transmitted by the tag. This information can then by used by the RFID system to perform whatever function the system is designed to perform. For example, an RFID system in a store can be used to track merchandise.
  • RFID tags can come in two basic types; passive, or active. Passive RFID tags do not include their own power supply. A small amount of electrical current is induced in the antenna by an incoming radio frequency signal produced by the reader. This current can then be used to provide power so that the tag can transmit a response when it is interrogated by the RFID reader. This power can be limited, therefore, the response may need to be short. Further, the inherent power limitations of passive tags can limit the transmit range of the tag.
  • active RFID tags have a power source, and can have larger memories and/or longer ranges than passive tags. While active tags can, in some cases have more capabilities when compared to passive tags, passive tags are generally much cheaper to manufacture than active tags and they do not need a battery. Thus, passive tags are generally much smaller and less costly, making them preferable for many applications.
  • a locking system can include an RFID lock that comprises a locking mechanism and an RFID reader.
  • the locking mechanism can be unlocked when an RFID device configured to be an RFID key is brought into proximity of the RFID lock.
  • the RFID key can include an RFID tag.
  • the locking system can communicate through a communication network to a system that can, for example, be used to store information, such as which RFID enabled key(s) can open which RFID enabled lock(s).
  • the data communicated between the RFID lock and the system can also include, for example, tracking information, configuration information, etc.
  • the locking system can include an RFID lock that can include a shackle and a body.
  • the shackle and body can, for example, be steel, however, other materials commonly used to produce locks, such as metal alloys, etc., can be used to form the shackle and body. Additionally, RFID lock technology is not limited to currently available metal alloys and materials for the shackle and body.
  • the shackle can be pressed into the body and locked into place by an electronic piston. When the RFID lock is to be unlocked, an electronic piston can release the shackle allowing the lock to be opened. Unlike conventional locks, however, the electronic piston can be controlled by an RFID reader. The electronic piston can be opened when the RFID reader reads an RFID enabled key that is configured to unlock the RFID lock. In other words, specific RFID enabled keys can be configured to open the RFID lock analogously to the way that specific keys can be cut to configure the key to open a specific lock.
  • the RFID enabled key can be included in a card, wristband, or other device. Further, the RFID enabled key can be electronically configured rather than “cut” as a key is cut. It will further be understood that this electronic configuration can include tuning an antenna on RFID enabled key which can include some physical configuration of the antenna, such as milling or cutting various shapes, lengths, etc. for the antenna.
  • the locking system can be used to lock, e.g., a shipping container, trailers, railroad cars, or other lockable shipping devices.
  • RFID locks can be used in other applications that use conventional padlocks or similar locking devices.
  • Examples of conventional padlocks or similar locking devices include, but are not limited to, vehicle security locks, towing locks, backpack locks, bike locks, outboard motor padlocks, gun locks, cable locks, and any of the various kinds and styles of padlocks.
  • systems and methods described herein can be applied to other types of locks, such as car doors, hotel doors, doors to rooms at resorts, or on cruise ships, residence entry doors, business entry doors, etc.
  • the systems and methods described herein can be employed where entry and/or access needs to be restricted, e.g., where a traditional key or key type device may be used.
  • FIG. 1 is a diagram illustrating an example shipping container and locking system in accordance with one embodiment
  • FIG. 2 is a diagram illustrating the example locking system of FIG. 1 in more detail
  • FIG. 3 is a flowchart illustrating an example method of locking and tracking in accordance with one embodiment
  • FIG. 4 is a diagram illustrating an example third party RFID reader that can be connected to the system in FIG. 2 ;
  • FIG. 5 is a flowchart illustrating an example method of paying a third party service provider.
  • FIG. 1 is a diagram illustrating an example shipping container 100 and locking system in accordance with one embodiment of the systems and methods described herein. While an example shipping container 100 is illustrated, it will be understood that the systems and methods described herein can be used with shipping containers, trailers, railroad cars, or other lockable shipping devices. In fact, the systems and methods described herein can be applied whenever secure locking systems are needed. As discussed above, other examples include car doors, hotel doors, doors to rooms at resorts, or on cruise ships, residence entry doors, business entry doors, etc.
  • shipping container 100 can include one or more doors 102 that can allow access to its interior.
  • the door or doors 102 can include a locking mechanism 104 that can allow doors 102 to be locked. In this way any items that are being shipped in shipping container 100 can be secured to help lower the probability of theft, etc.
  • Locking mechanism 104 can be locked using an RFID lock 106 .
  • RFID lock 106 will be discussed further with respect to FIG. 2 .
  • shipping container 100 is one example application of the systems and methods described herein and that the systems and methods described herein can be used in conjunction with other lockable items, not just containers, trailers, railroad cars, or other lockable shipping devices.
  • RFID lock 106 is shown used in conjunction with shipping container 100
  • RFID lock 106 can be used in other applications that use conventional padlocks or similar locking devices.
  • Examples of conventional padlocks or similar locking devices include, but are not limited to, vehicle security locks, towing locks, backpack locks, bike locks, outboard motor padlocks, gun locks, cable locks and any of the various kinds and styles of padlocks. This list is not intended to be exhaustive.
  • systems and methods described herein can be applied to other types of locks, such as car doors, hotel doors, doors to rooms at resorts, and on cruise ships, residence entries, business entry doors, etc.
  • the systems and methods described herein can be employed where entry and/or access needs to be restricted, e.g., where a traditional key or key type device may be used.
  • GPS Global Positioning System
  • these locks can be used to help track and potentially recover stolen items. For example, if a backpack is stolen, but the lock is not removed from the backpack, then the RFID lock with position/location technology can be used to track and, in some cases, recover the stolen backpack. It will be understood that in cases when theft necessarily involves forcefully removing an RFID lock from an item, it can be difficult or impossible to track that item.
  • GPS Global Positioning System
  • FIG. 2 is a diagram illustrating an example locking system in accordance with one embodiment of the systems and methods described herein.
  • the locking system includes RFID lock 106 discussed above with respect to FIG. 1 that can include a shackle 200 and body 202 .
  • Shackle 200 and body 202 can, for example, be steel, however, other materials commonly used to produce locks, such as metal alloys, etc., can be used to form shackle 200 and body 202 .
  • RFID lock technology is not limited to currently available metal alloys and materials for the shackle 200 and body 202 .
  • Shackle 200 can be pressed into body 202 and locked into place by electronic piston 204 . When RFID lock 106 is to be unlocked, electronic piston 204 can release shackle 200 allowing the lock to be opened.
  • electronic piston 204 can be controlled by an RFID reader 206 .
  • Electronic piston 204 can be opened when RFID reader 206 reads an RFID enabled key 212 that is configured to unlock RFID lock 106 .
  • specific RFID enabled keys 212 can be configured to open RFID lock 106 analogously to the way that specific keys can be cut to configure the key to open a specific lock.
  • RFID enabled key 212 can be configured electronically rather than “cut” as a key is cut. It will further be understood that this electronic configuration can include tuning an antenna on RFID enabled key 212 which can include some physical configuration of the antenna, such as milling or cutting various shapes, lengths, etc. for the antenna.
  • RFID reader 206 can be an active device that transmits signals 210 by using antenna 208 .
  • RFID reader 206 can send and receive signals from RFID enabled key 212 through antenna 208 and when RFID reader 206 is close enough to RFID enabled key 212 then electronic piston 204 can be released and the lock can be opened.
  • RFID enabled key 212 can be a card that is specifically configured to open RFID lock 106 .
  • Other RFID devices not so configured generally cannot open RFID lock 106 e.g., the other RFID enabled key can be configured to open other RFID locks, or alternatively, the other RFID enabled key can be an entirely different type of RFID device.
  • RFID lock 106 can include an internal power source, such as battery 218 , to power the RFID circuits and any other circuits included in the lock 106 .
  • Other circuits can include, for example, an antenna and transceiver 214 .
  • Antenna and transceiver 214 can include RF systems, WIFI, GSM, GPS, GPRS, other types of systems, or a combination of multiple systems. It will further be understood that the antenna and transceiver 214 can be a receiver, transmitter, or both, depending on the specific application and embodiment.
  • a combination of WIFI and GPS can be used.
  • the GPS can provide position/location information and the WIFI can allow the lock to transmit the position/location information.
  • the lock can be set to transmit its position whenever it is moved.
  • Other combinations, such as GPS and GSM are also possible.
  • Antenna and transceiver 214 can transmit and/or receive signals from repeater 220 that can be connected to network 222 and system 224 . In this way, data can be communicated from RFID lock 106 to system 224 , to RFID lock 106 from system 224 , or both.
  • This information can include tracking information, configuration information, including, e.g., which RFID enabled keys can open RFID lock 212 , etc.
  • RFID lock 106 can only be opened in a specific location, as determined, for example, by a GPS in conjunction with RFID enabled key 212 .
  • the location information can be stored, e.g., at system 224 , in RFID lock 106 , etc.
  • RFID reader 206 can be located within RFID lock 106 and RFID enabled key 212 can be external to RFID lock 106 . It will be understood, however, that the location of these devices can be reversed, e.g., an RFID lock can include an RFID enabled key and the RFID lock can be opened when, for example, a portable RFID reader is brought near the RFID tag located within the RFID lock.
  • FIG. 3 is a flowchart illustrating an example of a method of locking items, such as shipping containers, car doors, hotel doors, in accordance with one embodiment of the methods described herein.
  • an item can be locked using RFID lock 106 .
  • container 100 can be locked using RFID lock 106 .
  • an item to be locked can be any item that would use a key or key type system and a lock system, such as locking door knobs, padlocks, etc.
  • Other items that can be locked include car doors, hotel doors, doors at resorts, doors at businesses, residence doors, etc. Examples that can use an padlock type RFID lock can include containers 100 , tool boxes, gates, etc.
  • an RFID enabled key 212 configured to open RFID lock 106 can be brought into proximity of the lock 106 and in step 304 the RFID reader 206 that can be inside RFID lock 106 can read RFID enabled key 212 . In this way RFID enabled key 212 can be verified to determine that it contains an authorized key in step 306 .
  • the verification step can verify the key against data stored in the lock or against data stored in system 224 , depending on the specific embodiment.
  • step 308 information can be transmitted from RFID lock 106 to system 224 .
  • This information can be, e.g., as discussed above, position/location information.
  • RFID lock 106 can only be opened in one or more specified locations.
  • step 310 the information transmitted in step 308 can be verified, for example, it can be verified that RFID lock 106 is in a location where it can be opened. If this is the case, then in step 312 , RFID lock 106 can be opened. It will be understood that the position/location information is only one possible example.
  • An RFID locking system has been described with respect to an example that used an RFID padlock to lock a shipping container.
  • examples include, car door locks, door locks, etc.
  • a door lock at a hotel, resort, cruise ship, etc. can use an RFID lock.
  • an RFID lock can be installed on the doors to one or more rooms at the hotel.
  • an access card or a wrist band with an RFID tag embedded in it can be issued to the guest.
  • the access card or wristband can be used to unlock the door to the guests room.
  • the access device can comprise any type of device that is RFID enabled so as to operate with the RFID lock, e.g., in the hotel room door.
  • RFID RFID enabled
  • a card and a wristband are just two examples of RFID access devices that can be used in conjunction with the systems and methods described herein.
  • the RFID access device can also allow the hotel guest, or resort guest, cruise ship guest, theme park guest, etc., to access and/or pay for certain services or amenities in addition to unlocking the guests door, locker, etc., or allowing access to one or more rides.
  • the restaurants and shops can in the hotel can use a RFID reader to read the hotel guests RFID access device and charge the guest's room for any purchases. This can, for example, allow the guest to leave their money and/or wallet in their room when they go to the pool, but still allow the guest to access the services and amenities offered buy the hotel. This can reduce the risk of theft and increase convenience, which can drive increased sales.
  • FIG. 4 is a diagram illustrating an example RFID locking system 400 that can also allow access to other services, etc., in accordance with another embodiment of the systems and methods described herein.
  • an RFID reader 401 included in a lock such as a hotel door lock can be configured to be opened by and RFID access device.
  • RFID reader 401 can be in communication with system 404 via a network 402 .
  • System 404 can be similar to system 224 , but in this case can store information such as when a guest has entered their room, when they have left etc. This information can be used, for example, to automatically turn on the lights, air conditioner, etc., upon the guests arrival to their room, or to schedule maid service upon their departure.
  • Third party readers 406 also configured to communicate with the guest's access device can also be in communication with system 404 via network 402 to allow the guest to make purchases and charge those purchases back to his or her room or cabin bill.
  • an RFID reader 406 can be located at a third party provider's location.
  • a third party provider can include, for example, a gift shop, restaurant, or store, etc.
  • the third party provider's location can be located in or near the hotel or resort or on the cruise ship, for example, and can be a separate business from the hotel, resort, or cruise line, or it can be affiliated with the hotel, resort, or cruise line in some way.
  • the third party provider's RFID reader 406 can be in communication with system 404 over network 402 .
  • any purchases that a guest at the hotel would like to make can be charged to the guests room using the guests RFID enabled key as is discussed further below with respect to FIG. 5 .
  • RFID lock 401 and third party reader 406 can be configured to communicate over the same or different networks 402 .
  • FIG. 5 is a flowchart illustrating an example method of paying a third party service provider in accordance with one embodiment of the systems and methods described herein.
  • a hotel guest can decide to make a purchase from a third party service provider.
  • the third party service provider's location can be a restaurant in the hotel that a guest is staying in.
  • the guest can present a staff member at the restaurant his or her RFID enabled room key.
  • the room key can be read by an RFID reader located in the restaurant in step 502 .
  • the reader can read the data stored in the room key. This data can include, for example, room number, guest name, etc.
  • the information contained in the RFID room key can be transmitted to system 404 in step 504 and once the information is verified in step 506 payment can be effectuated in step 508 responsive to the RFID enabled key containing the correct user credentials and purchase information.
  • the third party provider's location can be almost any business commonly located at a hotel, resort, or on a cruise ship, etc.
  • the RF enabled room key can be, e.g., an access card, wrist band, etc.

Abstract

A locking system can include an RFID lock that can include a shackle and a body that can, for example, be steel, or other materials commonly used to produce locks, such as metal alloys, etc. The shackle can be pressed into the body and locked into place by an electronic piston. When the RFID lock is to be unlocked, an electronic piston can release the shackle allowing the lock to be opened. Unlike conventional locks, however, the electronic piston can be controlled by an RFID reader. The electronic piston can be opened when the RFID reader reads an RFID enabled key that is configured to unlock the RFID lock. In other words, specific RFID enabled keys can be configured to open the RFID lock analogously to the way that specific keys can be cut to configure the key to open a specific lock.

Description

    RELATED APPLICATIONS
  • This application is based upon and claims the benefit of priority from U.S. Provisional Patent Application Ser. No. 60/701,793, filed Jul. 22, 2005, the entire contents of which are incorporated herein by reference.
  • BACKGROUND
  • 1. Field of the Invention
  • The present invention relates generally to Radio Frequency Identification Technology (RFID), and more particularly to secure locking mechanisms that use RFID to control access.
  • 2. Background of the Invention
  • RFID systems can include several components including, RFID tags, RFID tag readers, RFID tag programmers, etc. The RFID system can allow data to be transmitted by the RFID tag to an RFID reader when the RFID reader interrogates the RFID tag. The information transmitted from the tag to the reader can be used or processed in many different ways depending on the particular application. For example, an RFID tag can provide identification information, or information about a product to which the tag is affixed, such as the price of the product.
  • Generally, in an RFID system, individual objects are equipped with an RFID tag. The RFID tag can contain a transponder that can include a digital memory chip that can be given a unique electronic code. The RFID reader can transmit a signal activating the RFID tag and allowing it to be read and written with data. For example, when an RFID tag passes through an RFID reader, the RFID tag can detect a signal from the reader and can transmit data from the tag to the reader in response. The reader can then decode the data transmitted by the tag. This information can then by used by the RFID system to perform whatever function the system is designed to perform. For example, an RFID system in a store can be used to track merchandise.
  • RFID tags can come in two basic types; passive, or active. Passive RFID tags do not include their own power supply. A small amount of electrical current is induced in the antenna by an incoming radio frequency signal produced by the reader. This current can then be used to provide power so that the tag can transmit a response when it is interrogated by the RFID reader. This power can be limited, therefore, the response may need to be short. Further, the inherent power limitations of passive tags can limit the transmit range of the tag.
  • On the other hand, active RFID tags have a power source, and can have larger memories and/or longer ranges than passive tags. While active tags can, in some cases have more capabilities when compared to passive tags, passive tags are generally much cheaper to manufacture than active tags and they do not need a battery. Thus, passive tags are generally much smaller and less costly, making them preferable for many applications.
  • SUMMARY
  • A locking system can include an RFID lock that comprises a locking mechanism and an RFID reader. The locking mechanism can be unlocked when an RFID device configured to be an RFID key is brought into proximity of the RFID lock. For example, the RFID key can include an RFID tag. When the RFID tag is brought into proximity of the RFID reader, the lock can be opened. Additionally, the locking system can communicate through a communication network to a system that can, for example, be used to store information, such as which RFID enabled key(s) can open which RFID enabled lock(s). The data communicated between the RFID lock and the system can also include, for example, tracking information, configuration information, etc.
  • In one aspect the locking system can include an RFID lock that can include a shackle and a body. The shackle and body can, for example, be steel, however, other materials commonly used to produce locks, such as metal alloys, etc., can be used to form the shackle and body. Additionally, RFID lock technology is not limited to currently available metal alloys and materials for the shackle and body. The shackle can be pressed into the body and locked into place by an electronic piston. When the RFID lock is to be unlocked, an electronic piston can release the shackle allowing the lock to be opened. Unlike conventional locks, however, the electronic piston can be controlled by an RFID reader. The electronic piston can be opened when the RFID reader reads an RFID enabled key that is configured to unlock the RFID lock. In other words, specific RFID enabled keys can be configured to open the RFID lock analogously to the way that specific keys can be cut to configure the key to open a specific lock.
  • In another aspect, the RFID enabled key can be included in a card, wristband, or other device. Further, the RFID enabled key can be electronically configured rather than “cut” as a key is cut. It will further be understood that this electronic configuration can include tuning an antenna on RFID enabled key which can include some physical configuration of the antenna, such as milling or cutting various shapes, lengths, etc. for the antenna.
  • The locking system can be used to lock, e.g., a shipping container, trailers, railroad cars, or other lockable shipping devices. In fact RFID locks can be used in other applications that use conventional padlocks or similar locking devices. Examples of conventional padlocks or similar locking devices include, but are not limited to, vehicle security locks, towing locks, backpack locks, bike locks, outboard motor padlocks, gun locks, cable locks, and any of the various kinds and styles of padlocks.
  • Further, as explained below, the systems and methods described herein can be applied to other types of locks, such as car doors, hotel doors, doors to rooms at resorts, or on cruise ships, residence entry doors, business entry doors, etc. Essentially, the systems and methods described herein can be employed where entry and/or access needs to be restricted, e.g., where a traditional key or key type device may be used.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • For a more complete understanding of the invention, and the advantages thereof, reference is now made to the following descriptions taken in conjunction with the accompanying drawings, in which:
  • FIG. 1 is a diagram illustrating an example shipping container and locking system in accordance with one embodiment;
  • FIG. 2 is a diagram illustrating the example locking system of FIG. 1 in more detail;
  • FIG. 3 is a flowchart illustrating an example method of locking and tracking in accordance with one embodiment;
  • FIG. 4 is a diagram illustrating an example third party RFID reader that can be connected to the system in FIG. 2; and
  • FIG. 5 is a flowchart illustrating an example method of paying a third party service provider.
  • DETAILED DESCRIPTION
  • FIG. 1 is a diagram illustrating an example shipping container 100 and locking system in accordance with one embodiment of the systems and methods described herein. While an example shipping container 100 is illustrated, it will be understood that the systems and methods described herein can be used with shipping containers, trailers, railroad cars, or other lockable shipping devices. In fact, the systems and methods described herein can be applied whenever secure locking systems are needed. As discussed above, other examples include car doors, hotel doors, doors to rooms at resorts, or on cruise ships, residence entry doors, business entry doors, etc.
  • In one aspect, shipping container 100 can include one or more doors 102 that can allow access to its interior. The door or doors 102 can include a locking mechanism 104 that can allow doors 102 to be locked. In this way any items that are being shipped in shipping container 100 can be secured to help lower the probability of theft, etc. Locking mechanism 104 can be locked using an RFID lock 106. RFID lock 106 will be discussed further with respect to FIG. 2.
  • Again, it will be understood that shipping container 100 is one example application of the systems and methods described herein and that the systems and methods described herein can be used in conjunction with other lockable items, not just containers, trailers, railroad cars, or other lockable shipping devices. For example, it will be understood that while RFID lock 106 is shown used in conjunction with shipping container 100, RFID lock 106 can be used in other applications that use conventional padlocks or similar locking devices. Examples of conventional padlocks or similar locking devices include, but are not limited to, vehicle security locks, towing locks, backpack locks, bike locks, outboard motor padlocks, gun locks, cable locks and any of the various kinds and styles of padlocks. This list is not intended to be exhaustive.
  • Further, as explained below, the systems and methods described herein can be applied to other types of locks, such as car doors, hotel doors, doors to rooms at resorts, and on cruise ships, residence entries, business entry doors, etc. Essentially, the systems and methods described herein can be employed where entry and/or access needs to be restricted, e.g., where a traditional key or key type device may be used.
  • In embodiments that use position/location technology such as Global Positioning System (GPS) as described below, these locks can be used to help track and potentially recover stolen items. For example, if a backpack is stolen, but the lock is not removed from the backpack, then the RFID lock with position/location technology can be used to track and, in some cases, recover the stolen backpack. It will be understood that in cases when theft necessarily involves forcefully removing an RFID lock from an item, it can be difficult or impossible to track that item.
  • FIG. 2 is a diagram illustrating an example locking system in accordance with one embodiment of the systems and methods described herein. The locking system includes RFID lock 106 discussed above with respect to FIG. 1 that can include a shackle 200 and body 202. Shackle 200 and body 202 can, for example, be steel, however, other materials commonly used to produce locks, such as metal alloys, etc., can be used to form shackle 200 and body 202. Additionally, RFID lock technology is not limited to currently available metal alloys and materials for the shackle 200 and body 202. Shackle 200 can be pressed into body 202 and locked into place by electronic piston 204. When RFID lock 106 is to be unlocked, electronic piston 204 can release shackle 200 allowing the lock to be opened. Unlike conventional locks, however, electronic piston 204 can be controlled by an RFID reader 206. Electronic piston 204 can be opened when RFID reader 206 reads an RFID enabled key 212 that is configured to unlock RFID lock 106. In other words, specific RFID enabled keys 212 can be configured to open RFID lock 106 analogously to the way that specific keys can be cut to configure the key to open a specific lock.
  • It will be understood that generally, RFID enabled key 212 can be configured electronically rather than “cut” as a key is cut. It will further be understood that this electronic configuration can include tuning an antenna on RFID enabled key 212 which can include some physical configuration of the antenna, such as milling or cutting various shapes, lengths, etc. for the antenna.
  • RFID reader 206 can be an active device that transmits signals 210 by using antenna 208. RFID reader 206 can send and receive signals from RFID enabled key 212 through antenna 208 and when RFID reader 206 is close enough to RFID enabled key 212 then electronic piston 204 can be released and the lock can be opened. Recall that RFID enabled key 212 can be a card that is specifically configured to open RFID lock 106. Other RFID devices not so configured generally cannot open RFID lock 106, e.g., the other RFID enabled key can be configured to open other RFID locks, or alternatively, the other RFID enabled key can be an entirely different type of RFID device.
  • Generally, RFID lock 106 can include an internal power source, such as battery 218, to power the RFID circuits and any other circuits included in the lock 106. Other circuits can include, for example, an antenna and transceiver 214. Antenna and transceiver 214 can include RF systems, WIFI, GSM, GPS, GPRS, other types of systems, or a combination of multiple systems. It will further be understood that the antenna and transceiver 214 can be a receiver, transmitter, or both, depending on the specific application and embodiment.
  • For example, in one embodiment a combination of WIFI and GPS can be used. The GPS can provide position/location information and the WIFI can allow the lock to transmit the position/location information. For example, the lock can be set to transmit its position whenever it is moved. Other combinations, such as GPS and GSM are also possible.
  • Antenna and transceiver 214 can transmit and/or receive signals from repeater 220 that can be connected to network 222 and system 224. In this way, data can be communicated from RFID lock 106 to system 224, to RFID lock 106 from system 224, or both. This information can include tracking information, configuration information, including, e.g., which RFID enabled keys can open RFID lock 212, etc.
  • In one embodiment, RFID lock 106 can only be opened in a specific location, as determined, for example, by a GPS in conjunction with RFID enabled key 212. The location information can be stored, e.g., at system 224, in RFID lock 106, etc.
  • In the embodiment described above with respect to FIG. 2, RFID reader 206 can be located within RFID lock 106 and RFID enabled key 212 can be external to RFID lock 106. It will be understood, however, that the location of these devices can be reversed, e.g., an RFID lock can include an RFID enabled key and the RFID lock can be opened when, for example, a portable RFID reader is brought near the RFID tag located within the RFID lock.
  • FIG. 3 is a flowchart illustrating an example of a method of locking items, such as shipping containers, car doors, hotel doors, in accordance with one embodiment of the methods described herein. In step 302 an item can be locked using RFID lock 106. For example, container 100 can be locked using RFID lock 106. Essentially an item to be locked can be any item that would use a key or key type system and a lock system, such as locking door knobs, padlocks, etc. Other items that can be locked include car doors, hotel doors, doors at resorts, doors at businesses, residence doors, etc. Examples that can use an padlock type RFID lock can include containers 100, tool boxes, gates, etc.
  • When locked container 100 needs to be unlocked an RFID enabled key 212 configured to open RFID lock 106 can be brought into proximity of the lock 106 and in step 304 the RFID reader 206 that can be inside RFID lock 106 can read RFID enabled key 212. In this way RFID enabled key 212 can be verified to determine that it contains an authorized key in step 306. The verification step can verify the key against data stored in the lock or against data stored in system 224, depending on the specific embodiment.
  • In one embodiment, verification that RFID enabled key 212 contains an authorized key can cause RFID lock 106 to open, however, in another embodiment other security steps can be necessary. For example, in step 308, information can be transmitted from RFID lock 106 to system 224. This information can be, e.g., as discussed above, position/location information. In one embodiment, RFID lock 106 can only be opened in one or more specified locations. In step 310, the information transmitted in step 308 can be verified, for example, it can be verified that RFID lock 106 is in a location where it can be opened. If this is the case, then in step 312, RFID lock 106 can be opened. It will be understood that the position/location information is only one possible example.
  • An RFID locking system has been described with respect to an example that used an RFID padlock to lock a shipping container. As discussed above, it will be understood that the systems and methods described herein can be used in almost any application that uses conventional door locks, padlocks, or other locking devices. As discussed above, examples include, car door locks, door locks, etc. In one aspect a door lock at a hotel, resort, cruise ship, etc. can use an RFID lock. For example, an RFID lock can be installed on the doors to one or more rooms at the hotel. When a guest checks into the hotel, an access card or a wrist band with an RFID tag embedded in it can be issued to the guest. The access card or wristband can be used to unlock the door to the guests room.
  • The access device can comprise any type of device that is RFID enabled so as to operate with the RFID lock, e.g., in the hotel room door. Thus, it will be understood that a card and a wristband are just two examples of RFID access devices that can be used in conjunction with the systems and methods described herein.
  • In certain embodiments, the RFID access device can also allow the hotel guest, or resort guest, cruise ship guest, theme park guest, etc., to access and/or pay for certain services or amenities in addition to unlocking the guests door, locker, etc., or allowing access to one or more rides. For example, the restaurants and shops can in the hotel can use a RFID reader to read the hotel guests RFID access device and charge the guest's room for any purchases. This can, for example, allow the guest to leave their money and/or wallet in their room when they go to the pool, but still allow the guest to access the services and amenities offered buy the hotel. This can reduce the risk of theft and increase convenience, which can drive increased sales.
  • FIG. 4 is a diagram illustrating an example RFID locking system 400 that can also allow access to other services, etc., in accordance with another embodiment of the systems and methods described herein. In system 400, an RFID reader 401 included in a lock such as a hotel door lock can be configured to be opened by and RFID access device. In addition, RFID reader 401 can be in communication with system 404 via a network 402. System 404 can be similar to system 224, but in this case can store information such as when a guest has entered their room, when they have left etc. This information can be used, for example, to automatically turn on the lights, air conditioner, etc., upon the guests arrival to their room, or to schedule maid service upon their departure.
  • Third party readers 406, also configured to communicate with the guest's access device can also be in communication with system 404 via network 402 to allow the guest to make purchases and charge those purchases back to his or her room or cabin bill. For example, an RFID reader 406 can be located at a third party provider's location. A third party provider can include, for example, a gift shop, restaurant, or store, etc. The third party provider's location can be located in or near the hotel or resort or on the cruise ship, for example, and can be a separate business from the hotel, resort, or cruise line, or it can be affiliated with the hotel, resort, or cruise line in some way.
  • The third party provider's RFID reader 406 can be in communication with system 404 over network 402. Thus, any purchases that a guest at the hotel would like to make can be charged to the guests room using the guests RFID enabled key as is discussed further below with respect to FIG. 5.
  • It should be noted that RFID lock 401 and third party reader 406 can be configured to communicate over the same or different networks 402.
  • FIG. 5 is a flowchart illustrating an example method of paying a third party service provider in accordance with one embodiment of the systems and methods described herein. In step 500 a hotel guest can decide to make a purchase from a third party service provider. For example, the third party service provider's location can be a restaurant in the hotel that a guest is staying in.
  • The guest can present a staff member at the restaurant his or her RFID enabled room key. The room key can be read by an RFID reader located in the restaurant in step 502. The reader can read the data stored in the room key. This data can include, for example, room number, guest name, etc. The information contained in the RFID room key can be transmitted to system 404 in step 504 and once the information is verified in step 506 payment can be effectuated in step 508 responsive to the RFID enabled key containing the correct user credentials and purchase information.
  • While the example above has been discussed with respect to a hotel, as described in the discussion of FIG. 4, it will be understood that these systems and methods can also be applied to a resort, cruise ship, etc. Further, the third party provider's location can be almost any business commonly located at a hotel, resort, or on a cruise ship, etc. Additionally, the RF enabled room key can be, e.g., an access card, wrist band, etc.
  • While certain embodiments of the inventions have been described above, it will be understood that the embodiments described are by way of example only. Accordingly, the inventions should not be limited based on the described embodiments.

Claims (22)

1 A Radio Frequency Identification (RFID) lock comprising:
a lock body;
a shackle, configured to be pressed into the lock body;
an electronic piston configured to lock the shackle into place, and an RFID Reader configured to control the electronic piston.
2. The lock of claim 1, further comprising an antenna coupled to the reader and configured to send and receive Radio Frequency (RF) signals.
3. The lock of claim 2, wherein the reader comprises an active device.
4. The lock of claim 3, wherein the reader transmits signals using the antenna.
5. The lock of claim 1, further comprising an internal power source.
6. The lock of claim 5, wherein the internal power source comprises a battery.
7. The lock of claim 1, further comprising a second antenna and transceiver.
8. The lock of claim 7, wherein the second antenna and transceiver are configured to implement a communication protocol.
9. The lock of claim 8, wherein the communication protocol comprises WIFI.
10. The lock of claim 8, wherein the communication protocol comprises GSM.
11. The lock of claim 8, wherein the communication protocol comprises GPS.
12. The lock of claim 8, wherein the communication protocol comprises GPRS.
13. The lock of claim 8, wherein the communication protocol comprises a combination of communication protocols.
14. A method for locking an RFID lock comprising:
locking an RFID lock;
reading an RFID enabled key reader using an RFID reader in the lock; and
verifying that the RFID enabled key contains an authorized key.
15. The method of claim 14, wherein the RFID lock is used to secure a shipping container.
16. The method of claim 14, wherein the RFID lock is used to secure a trailer.
17. The method of claim 14, wherein the RFID lock is used to secure a railroad car.
18. The method of claim 14, wherein the key is verified against data stored in the lock.
19. The method of claim 14, wherein the key is verified against data stored in a locking system.
20. The method of claim 14, further comprising:
transmitting information from the lock to an RFID lock system;
verifying the transmitted information; and
opening the lock responsive to the RFID containing an authorized key and the verified information.
21. The method of claim 20, wherein the information comprises position/location information.
22. The method of claim 21, wherein the lock can only be opened at a specified locations.
US11/459,598 2005-07-22 2006-07-24 Systems and methods for secure locking mechanisms Abandoned US20070018787A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US11/459,598 US20070018787A1 (en) 2005-07-22 2006-07-24 Systems and methods for secure locking mechanisms

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US70179305P 2005-07-22 2005-07-22
US11/459,598 US20070018787A1 (en) 2005-07-22 2006-07-24 Systems and methods for secure locking mechanisms

Publications (1)

Publication Number Publication Date
US20070018787A1 true US20070018787A1 (en) 2007-01-25

Family

ID=37683880

Family Applications (1)

Application Number Title Priority Date Filing Date
US11/459,598 Abandoned US20070018787A1 (en) 2005-07-22 2006-07-24 Systems and methods for secure locking mechanisms

Country Status (3)

Country Link
US (1) US20070018787A1 (en)
MX (1) MX2008001006A (en)
WO (1) WO2007014151A2 (en)

Cited By (53)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070115097A1 (en) * 2005-11-23 2007-05-24 Intellimatics, Llc Security key system, method and device
US20070228091A1 (en) * 2006-03-30 2007-10-04 Jack Shawen Back support with straps that is changeable with storage area
US20080117045A1 (en) * 2003-01-10 2008-05-22 Roberts Stuart J Method and system for monitoring room activity
US20080252415A1 (en) * 2007-04-12 2008-10-16 Larson Wayne F Restricted range lockbox, access device and methods
EP2079058A2 (en) * 2007-12-28 2009-07-15 Teleco Automation S.R.L. Multiple user device for radio-commanded access control
US20100033325A1 (en) * 2008-08-07 2010-02-11 The Stanley Works Israel Ltd. Tool container with an alarm system
US20100148919A1 (en) * 2003-01-10 2010-06-17 Roberts Stuart J Method and system for room activity communication
US7782205B1 (en) * 2007-09-25 2010-08-24 Hiroki Gakumura Electronic device with an antitheft function and method for preventing theft of electronic devices
US20100245057A1 (en) * 2009-03-31 2010-09-30 Aravind Chamarti Components, systems, and methods for associating sensor data with component location
US20110072132A1 (en) * 2009-09-21 2011-03-24 Checkpoint Systems, Inc. Retail Product Tracking System, Method, and Apparatus
US20110068921A1 (en) * 2009-09-21 2011-03-24 Checkpoint Systems, Inc. configurable monitoring device
US20110074541A1 (en) * 2009-09-30 2011-03-31 Matthew Preston Jones Locker system and method
US20110148582A1 (en) * 2007-09-05 2011-06-23 Confidex Oy Rfid transponder and method
WO2011145074A1 (en) * 2010-05-19 2011-11-24 Microio - Serviços De Electrónica Lda. System for managing the shared use of bicycles
US8172468B2 (en) 2010-05-06 2012-05-08 Corning Incorporated Radio frequency identification (RFID) in communication connections, including fiber optic components
US20130013128A1 (en) * 2011-07-05 2013-01-10 Huf Hulsbeck & Furst Gmbh & Co. Kg Mobile identification transmitter which can be set to a normal state and a secure state
US8378826B2 (en) 2009-10-02 2013-02-19 Checkpoint Systems, Inc. Key device for monitoring systems
US8421626B2 (en) 2006-10-31 2013-04-16 Corning Cable Systems, Llc Radio frequency identification transponder for communicating condition of a component
US20130209108A1 (en) * 2012-02-14 2013-08-15 Avaya Inc. System and method for personalized hoteling of mobile workers
US20130254137A1 (en) * 2007-07-31 2013-09-26 Andrew Stuart HUNT Advertising and Marketing Method and Device
US8640513B2 (en) * 2011-06-22 2014-02-04 The Stanley Works Israel Ltd. Electronic and manual lock assembly
US8640514B2 (en) 2011-06-22 2014-02-04 The Stanley Works Israel Ltd. Electronic and manual lock assembly
WO2014049085A1 (en) * 2012-09-28 2014-04-03 Danlers Limited Control system
CN104075619A (en) * 2014-06-20 2014-10-01 柳州治业科技有限公司 Intelligent firearm locking and unlocking system
US20150015374A1 (en) * 2012-01-31 2015-01-15 Eits Global Limited Sezc System, method, computer program and data signal for the collection, use and dissemination of information
US20150045945A1 (en) * 2008-12-05 2015-02-12 Aethon, Inc. System and Method for Securely Transporting an Item
WO2015079190A1 (en) * 2013-11-29 2015-06-04 Uleotech Merchandise transport cart with protected opening, and secure opening/closing system and method implementing one such cart
US20150187154A1 (en) * 2014-01-02 2015-07-02 Chiao-Pen Juan Hybrid Linking-Up Lock Device
US9159012B2 (en) 2009-11-30 2015-10-13 Corning Incorporated RFID condition latching
US9165232B2 (en) 2012-05-14 2015-10-20 Corning Incorporated Radio-frequency identification (RFID) tag-to-tag autoconnect discovery, and related methods, circuits, and systems
WO2016023020A1 (en) * 2014-08-08 2016-02-11 RPH Engineering Electronic locking system
US9349030B2 (en) 2012-12-29 2016-05-24 Meps Real-Time, Inc. System and method of optimizing the process of identifying items tagged with RFID tags in an enclosed shielded space
WO2016106297A1 (en) * 2014-12-23 2016-06-30 Desinor Garcia Jr Real estate wireless lockbox
US9530266B2 (en) * 2013-02-06 2016-12-27 Hornady Manufacturing Company Handgun mini-vault
US9563832B2 (en) 2012-10-08 2017-02-07 Corning Incorporated Excess radio-frequency (RF) power storage and power sharing RF identification (RFID) tags, and related connection systems and methods
US9652709B2 (en) 2006-10-31 2017-05-16 Fiber Mountain, Inc. Communications between multiple radio frequency identification (RFID) connected tags and one or more devices, and related systems and methods
US9652707B2 (en) 2006-10-31 2017-05-16 Fiber Mountain, Inc. Radio frequency identification (RFID) connected tag communications protocol and related systems and methods
US9652708B2 (en) 2006-10-31 2017-05-16 Fiber Mountain, Inc. Protocol for communications between a radio frequency identification (RFID) tag and a connected device, and related systems and methods
US20170236352A1 (en) * 2014-07-30 2017-08-17 Master Lock Company Llc Location tracking for locking device
US10032102B2 (en) 2006-10-31 2018-07-24 Fiber Mountain, Inc. Excess radio-frequency (RF) power storage in RF identification (RFID) tags, and related systems and methods
US10094885B2 (en) 2014-10-27 2018-10-09 Master Lock Company Llc Predictive battery warnings for an electronic locking device
US10142843B2 (en) 2014-07-30 2018-11-27 Master Lock Company Llc Wireless key management for authentication
US10403069B2 (en) 2014-12-23 2019-09-03 Garcia Desinor, JR. Real estate wireless lockbox
US20190277056A1 (en) * 2010-11-09 2019-09-12 Master Lock Company Llc Systems and methods for monitoring lockout procedures
US10581850B2 (en) 2014-07-30 2020-03-03 Master Lock Company Llc Wireless firmware updates
US10636237B2 (en) * 2016-08-03 2020-04-28 Sujit Kanoria System and method for preventing pilferage and tampering of a lock from a vehicle
US10738510B1 (en) * 2018-09-28 2020-08-11 Amazon Technologies, Inc. Geofence transport sealing
US10948263B2 (en) 2017-12-01 2021-03-16 Hornady Manufacturing Company Long gun security storage container
US10950147B1 (en) 2018-09-28 2021-03-16 Amazon Technologies, Inc. Geofence transport sealing
US11028635B2 (en) 2013-02-06 2021-06-08 Hornady Manufacturing Company Firearm safety device
US20220351558A1 (en) * 2021-05-02 2022-11-03 Jeffrey Scott VanDeusen Position keyed lockbox
US11566868B2 (en) 2019-11-21 2023-01-31 Hornady Manufacturing Company Firearm storage device
US11734974B2 (en) 2021-04-21 2023-08-22 Hornady Mannfacturing Company Safe with biometric lock mechanism

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8577042B2 (en) 2006-06-21 2013-11-05 Rf Code, Inc. Location-based security, privacy, access control and monitoring system
NL2004192C2 (en) * 2010-02-04 2011-08-08 Aciss Internat B V Container, system and method for goods transport.
EP3795788B1 (en) * 2019-09-23 2023-07-12 BeachBuddy GmbH Apparatus for locking a rental chair

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020180582A1 (en) * 1999-11-30 2002-12-05 Nielsen Ernst Lykke Electronic key device a system and a method of managing electronic key information
US20030179073A1 (en) * 2002-03-20 2003-09-25 Ohanes Ghazarian Electronic secure locking system
US6731212B2 (en) * 2001-05-16 2004-05-04 Sanyo Electric Co., Ltd. Tag device
US6792779B1 (en) * 2003-10-27 2004-09-21 Kou-Chi Shen Locking device operated by both of the mechanical and magnetic effects
US6803674B2 (en) * 2000-06-22 2004-10-12 Itw Limited Lock system
US20050006452A1 (en) * 2003-06-30 2005-01-13 International Bussiness Machines Corporation RFID-keyed mailbox, and RFID-based system and method for securing a mailbox
US7239238B2 (en) * 2004-03-30 2007-07-03 E. J. Brooks Company Electronic security seal
US20070257774A1 (en) * 2003-09-19 2007-11-08 Martin Stumpert Method and Device for Delivery or Obtaining of a Good
US20070262850A1 (en) * 2004-07-06 2007-11-15 Tagmaster Ab Electronic Security Seal
US20080036596A1 (en) * 2004-03-30 2008-02-14 Micha Auerbach Monitorable Locking Assemblies
US20080042811A1 (en) * 2003-12-16 2008-02-21 Jcdecaux Sa Automatic Cycle Storage System
US7446644B2 (en) * 2005-01-14 2008-11-04 Secureall Corporation Universal hands free key and lock system

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2004104329A2 (en) * 2003-05-16 2004-12-02 Stanton Concepts Inc. Multiple function lock
SE527340C2 (en) * 2003-09-04 2006-02-14 Aptus Elektronik Ab Locking device

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020180582A1 (en) * 1999-11-30 2002-12-05 Nielsen Ernst Lykke Electronic key device a system and a method of managing electronic key information
US6803674B2 (en) * 2000-06-22 2004-10-12 Itw Limited Lock system
US6731212B2 (en) * 2001-05-16 2004-05-04 Sanyo Electric Co., Ltd. Tag device
US20030179073A1 (en) * 2002-03-20 2003-09-25 Ohanes Ghazarian Electronic secure locking system
US20050006452A1 (en) * 2003-06-30 2005-01-13 International Bussiness Machines Corporation RFID-keyed mailbox, and RFID-based system and method for securing a mailbox
US20070257774A1 (en) * 2003-09-19 2007-11-08 Martin Stumpert Method and Device for Delivery or Obtaining of a Good
US6792779B1 (en) * 2003-10-27 2004-09-21 Kou-Chi Shen Locking device operated by both of the mechanical and magnetic effects
US20080042811A1 (en) * 2003-12-16 2008-02-21 Jcdecaux Sa Automatic Cycle Storage System
US7239238B2 (en) * 2004-03-30 2007-07-03 E. J. Brooks Company Electronic security seal
US20080036596A1 (en) * 2004-03-30 2008-02-14 Micha Auerbach Monitorable Locking Assemblies
US20070262850A1 (en) * 2004-07-06 2007-11-15 Tagmaster Ab Electronic Security Seal
US7446644B2 (en) * 2005-01-14 2008-11-04 Secureall Corporation Universal hands free key and lock system

Cited By (76)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100148919A1 (en) * 2003-01-10 2010-06-17 Roberts Stuart J Method and system for room activity communication
US20080117045A1 (en) * 2003-01-10 2008-05-22 Roberts Stuart J Method and system for monitoring room activity
US7474210B2 (en) 2003-01-10 2009-01-06 Monismart Systems Llc Method and system for monitoring room activity
US8264329B2 (en) 2003-01-10 2012-09-11 Monismart Systems, Llc Method and system for room activity communication
US20070115097A1 (en) * 2005-11-23 2007-05-24 Intellimatics, Llc Security key system, method and device
US20070228091A1 (en) * 2006-03-30 2007-10-04 Jack Shawen Back support with straps that is changeable with storage area
US10032102B2 (en) 2006-10-31 2018-07-24 Fiber Mountain, Inc. Excess radio-frequency (RF) power storage in RF identification (RFID) tags, and related systems and methods
US8421626B2 (en) 2006-10-31 2013-04-16 Corning Cable Systems, Llc Radio frequency identification transponder for communicating condition of a component
US9652709B2 (en) 2006-10-31 2017-05-16 Fiber Mountain, Inc. Communications between multiple radio frequency identification (RFID) connected tags and one or more devices, and related systems and methods
US9652707B2 (en) 2006-10-31 2017-05-16 Fiber Mountain, Inc. Radio frequency identification (RFID) connected tag communications protocol and related systems and methods
US9652708B2 (en) 2006-10-31 2017-05-16 Fiber Mountain, Inc. Protocol for communications between a radio frequency identification (RFID) tag and a connected device, and related systems and methods
US9670694B2 (en) * 2007-04-12 2017-06-06 Utc Fire & Security Americas Corporation, Inc. Restricted range lockbox, access device and methods
US20080252415A1 (en) * 2007-04-12 2008-10-16 Larson Wayne F Restricted range lockbox, access device and methods
US20130254137A1 (en) * 2007-07-31 2013-09-26 Andrew Stuart HUNT Advertising and Marketing Method and Device
US20110148582A1 (en) * 2007-09-05 2011-06-23 Confidex Oy Rfid transponder and method
US7782205B1 (en) * 2007-09-25 2010-08-24 Hiroki Gakumura Electronic device with an antitheft function and method for preventing theft of electronic devices
EP2079058A2 (en) * 2007-12-28 2009-07-15 Teleco Automation S.R.L. Multiple user device for radio-commanded access control
EP2079058A3 (en) * 2007-12-28 2009-11-04 Teleco Automation S.R.L. Multiple user device for radio-commanded access control
US20100033325A1 (en) * 2008-08-07 2010-02-11 The Stanley Works Israel Ltd. Tool container with an alarm system
US20150045945A1 (en) * 2008-12-05 2015-02-12 Aethon, Inc. System and Method for Securely Transporting an Item
US9618931B2 (en) * 2008-12-05 2017-04-11 Aethon, Inc. System and method for securely transporting an item
US20100245057A1 (en) * 2009-03-31 2010-09-30 Aravind Chamarti Components, systems, and methods for associating sensor data with component location
US8264366B2 (en) 2009-03-31 2012-09-11 Corning Incorporated Components, systems, and methods for associating sensor data with component location
US20110072132A1 (en) * 2009-09-21 2011-03-24 Checkpoint Systems, Inc. Retail Product Tracking System, Method, and Apparatus
US20110068921A1 (en) * 2009-09-21 2011-03-24 Checkpoint Systems, Inc. configurable monitoring device
US8452868B2 (en) 2009-09-21 2013-05-28 Checkpoint Systems, Inc. Retail product tracking system, method, and apparatus
US8508367B2 (en) 2009-09-21 2013-08-13 Checkpoint Systems, Inc. Configurable monitoring device
US20110068906A1 (en) * 2009-09-21 2011-03-24 Checkpoint Systems, Inc. Systems, methods, and apparatuses for managing configurable monitoring devices
US20110074541A1 (en) * 2009-09-30 2011-03-31 Matthew Preston Jones Locker system and method
US8253533B2 (en) * 2009-09-30 2012-08-28 Universal City Studios Llc Locker system and method
US8378826B2 (en) 2009-10-02 2013-02-19 Checkpoint Systems, Inc. Key device for monitoring systems
US9159012B2 (en) 2009-11-30 2015-10-13 Corning Incorporated RFID condition latching
US8172468B2 (en) 2010-05-06 2012-05-08 Corning Incorporated Radio frequency identification (RFID) in communication connections, including fiber optic components
US8333518B2 (en) 2010-05-06 2012-12-18 Corning Incorporated Radio frequency identification (RFID) in communication connections, including fiber optic components
WO2011145074A1 (en) * 2010-05-19 2011-11-24 Microio - Serviços De Electrónica Lda. System for managing the shared use of bicycles
US20190277056A1 (en) * 2010-11-09 2019-09-12 Master Lock Company Llc Systems and methods for monitoring lockout procedures
US8640513B2 (en) * 2011-06-22 2014-02-04 The Stanley Works Israel Ltd. Electronic and manual lock assembly
US8640514B2 (en) 2011-06-22 2014-02-04 The Stanley Works Israel Ltd. Electronic and manual lock assembly
US8972078B2 (en) * 2011-07-05 2015-03-03 Huf Hulsbeck & Furst Gmbh & Co. Kg Mobile identification transmitter which can be set to a normal state and a secure state
US20130013128A1 (en) * 2011-07-05 2013-01-10 Huf Hulsbeck & Furst Gmbh & Co. Kg Mobile identification transmitter which can be set to a normal state and a secure state
US20150015374A1 (en) * 2012-01-31 2015-01-15 Eits Global Limited Sezc System, method, computer program and data signal for the collection, use and dissemination of information
US20130209108A1 (en) * 2012-02-14 2013-08-15 Avaya Inc. System and method for personalized hoteling of mobile workers
US9165232B2 (en) 2012-05-14 2015-10-20 Corning Incorporated Radio-frequency identification (RFID) tag-to-tag autoconnect discovery, and related methods, circuits, and systems
WO2014049085A1 (en) * 2012-09-28 2014-04-03 Danlers Limited Control system
US9563832B2 (en) 2012-10-08 2017-02-07 Corning Incorporated Excess radio-frequency (RF) power storage and power sharing RF identification (RFID) tags, and related connection systems and methods
US9870495B2 (en) 2012-12-29 2018-01-16 Meps Real-Time, Inc. System and method using frequency hopping to identify items tagged with RFID tags in an enclosed space
US9349030B2 (en) 2012-12-29 2016-05-24 Meps Real-Time, Inc. System and method of optimizing the process of identifying items tagged with RFID tags in an enclosed shielded space
US10233687B2 (en) 2013-02-06 2019-03-19 Hornady Manufacturing Company Handgun mini-vault
US11028635B2 (en) 2013-02-06 2021-06-08 Hornady Manufacturing Company Firearm safety device
US9530266B2 (en) * 2013-02-06 2016-12-27 Hornady Manufacturing Company Handgun mini-vault
US11028636B2 (en) 2013-02-06 2021-06-08 Hornady Manufacturing Company Handgun mini-vault
WO2015079190A1 (en) * 2013-11-29 2015-06-04 Uleotech Merchandise transport cart with protected opening, and secure opening/closing system and method implementing one such cart
US20150187154A1 (en) * 2014-01-02 2015-07-02 Chiao-Pen Juan Hybrid Linking-Up Lock Device
CN104075619A (en) * 2014-06-20 2014-10-01 柳州治业科技有限公司 Intelligent firearm locking and unlocking system
US9996999B2 (en) 2014-07-30 2018-06-12 Master Lock Company Llc Location tracking for locking device
US10142843B2 (en) 2014-07-30 2018-11-27 Master Lock Company Llc Wireless key management for authentication
US10581850B2 (en) 2014-07-30 2020-03-03 Master Lock Company Llc Wireless firmware updates
US20170236352A1 (en) * 2014-07-30 2017-08-17 Master Lock Company Llc Location tracking for locking device
US10262484B2 (en) * 2014-07-30 2019-04-16 Master Lock Company Llc Location tracking for locking device
US10771975B2 (en) 2014-07-30 2020-09-08 Master Lock Company Llc Revocation of access credentials for a disconnected locking device
US11468721B2 (en) 2014-07-30 2022-10-11 Master Lock Company Llc Guest access for locking device
WO2016023020A1 (en) * 2014-08-08 2016-02-11 RPH Engineering Electronic locking system
US10094885B2 (en) 2014-10-27 2018-10-09 Master Lock Company Llc Predictive battery warnings for an electronic locking device
US10249121B2 (en) 2014-12-23 2019-04-02 Garcia Desinor, JR. Real estate wireless lockbox
US10403069B2 (en) 2014-12-23 2019-09-03 Garcia Desinor, JR. Real estate wireless lockbox
GB2550500A (en) * 2014-12-23 2017-11-22 Desinor Garcia Jr Real estate wireless lockbox
US9704319B2 (en) 2014-12-23 2017-07-11 Garcia Desinor, JR. Real estate wireless lockbox
WO2016106297A1 (en) * 2014-12-23 2016-06-30 Desinor Garcia Jr Real estate wireless lockbox
US10636237B2 (en) * 2016-08-03 2020-04-28 Sujit Kanoria System and method for preventing pilferage and tampering of a lock from a vehicle
US10948263B2 (en) 2017-12-01 2021-03-16 Hornady Manufacturing Company Long gun security storage container
US10738510B1 (en) * 2018-09-28 2020-08-11 Amazon Technologies, Inc. Geofence transport sealing
US10950147B1 (en) 2018-09-28 2021-03-16 Amazon Technologies, Inc. Geofence transport sealing
US11566868B2 (en) 2019-11-21 2023-01-31 Hornady Manufacturing Company Firearm storage device
US11734974B2 (en) 2021-04-21 2023-08-22 Hornady Mannfacturing Company Safe with biometric lock mechanism
US20220351558A1 (en) * 2021-05-02 2022-11-03 Jeffrey Scott VanDeusen Position keyed lockbox
US11508194B1 (en) * 2021-05-02 2022-11-22 Jeffrey Scott VanDeusen Position keyed lockbox

Also Published As

Publication number Publication date
WO2007014151A2 (en) 2007-02-01
WO2007014151A3 (en) 2009-04-02
MX2008001006A (en) 2008-04-04

Similar Documents

Publication Publication Date Title
US20070018787A1 (en) Systems and methods for secure locking mechanisms
US11332098B2 (en) Self-declaring electronic license plate with immobilizer features
US6142372A (en) Tractor/trailer having bar code thereon and a GPS receiver for tracking and logging purposes
US20160050309A1 (en) Restrictive cell phone use and anti-texting apparatus and methods
CN100449582C (en) Electronic security seal
US11748698B2 (en) System and method for secure delivery system
US20060157563A1 (en) Smart card systems in connection with transportation services
US20050149741A1 (en) Autorisations, regulation, characterisation, localisation, locking and theft security system (here also referred to as lock-loop dss)
US20020046173A1 (en) Method, apparatus and system to facilitate delivery of goods and services to secure locations
KR20010041561A (en) Monitoring system
CN101868810A (en) System for management of ubiquitously deployed intelligent locks
CN102576482A (en) Shipping container having integral geolock system
GB2518234A (en) Reminder apparatus for items left in a vehicle
US8477020B2 (en) Remote ignition, theft detterence, and records keeping system for a vehicle
JP2006514348A (en) Authentication, decision, recognition, position locking and anti-theft system
Roz et al. Using low power transponders and tags for RFID applications
JP2003038335A (en) Delivery storage locker system
KR101474169B1 (en) Delivery service receiving system
EP1710754A2 (en) Apparatus and method for ownership verification
RU2680546C2 (en) System, method and identification kit for identification of vehicle
KR20180076194A (en) The smart key including the radio frequency identification
JP2007084273A (en) Home delivery service providing method using ic card compatible locker
EP2713353B1 (en) System and method for identifying a vehicle
JP4739923B2 (en) Electronic key system
WO2001065478A2 (en) Library system with electronic identification and locking of compact disks

Legal Events

Date Code Title Description
AS Assignment

Owner name: NEOLOGY, INC., CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:NEOLOGY, INC.;REEL/FRAME:018531/0629

Effective date: 20060814

AS Assignment

Owner name: NEOLOGY, INC., CALIFORNIA

Free format text: CORRECTIVE ASSIGNMENT TO CORRECT THE ASSIGNOR OF THE ASSIGNMENT PREVIOUSLY RECORDED ON REEL 018531 FRAME 0629;ASSIGNORS:MARTINEZ DE VELASCO CORTINA, FRANCISCO;MARTINEZ DE VELASCO, ENRIQUE;MIKUTEIT, ERIC;AND OTHERS;REEL/FRAME:018554/0334;SIGNING DATES FROM 20060814 TO 20060920

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION